Introduction to Kubernetes Security

Aqua

Kubernetes is fundamentally a complex system with lots of different potential attack vectors aimed at data theft, currency mining and other threats. Liz Rice, a renowned technology evangelist, will take us through an overview of the current state of security-related features in Kubernetes, and offer directional starting points on how to secure Kubernetes components and the applications that run on top of these Kubernetes components. Brice Fernandes, software engineer and entrepreneur at Weaveworks, will then demonstrate how you can build a secure and reliable Kubernetes deployment pipeline with GitOps best practices, separating the responsibility between packaging software and releasing it to a production environment.
Watch Now

Spotlight

Phishing-Angriffe haben sich bereits seit einigen Jahren als häufigster Angriffsvektor etabliert. Begünstigt durch Faktoren wie die COVID-19-Pandemie, die Umstellung auf dezentrale Arbeitskonzepte und die kritische Log4j-Sicherheitslücke war 2021 eine weitere Zunahme um 29 % gegenüber dem Vorjahr zu verzeichnen. Phishing-Bedrohu

OTHER ON-DEMAND WEBINARS

Security Operations Automation

Security organizations are overworked and constrained. As more systems and users come online, it becomes more difficult to manage alerts and administer access to sometimes hundreds of applications for thousands of employees.
Watch Now

Managing the Insider Threat—Why Visibility Is Critical

ObserveI

Only with full visibility into employee or third-party activity across a company network can even the earliest indicators of an insider threat be detected. By monitoring both user and file activity, security and compliance professionals can be alerted to risky, out-of-policy activities and any unexplained changes in user behavior in real-time; successfully stopping and investigating any activity before it becomes a full-blown breach. Research from The Ponemon Institute shows that Financial Services organizations face the highest penalty costs of any other industry ($12.05 million annually) when they experience an insider-led incident, though they are closely followed by the Energy & Utilities and Retail sector. This cost alone is a very concrete reason to address what otherwise might seem to be an invisible problem.
Watch Now

Information is power: The role of threat intel in cloud security

Cloud security is complex. Join Omdia’s expert cybersecurity analysts as they discuss the complex nature of cloud security and provide insights into everything from threat intel and SaaS to infrastructure- and platform-as-a-service, customer responsibilities, emerging trends, and the kinds of tools available to help.
Watch Now

Mapping Your Ransomware Preparedness Strategy for 2023

As 2022 comes to a close, ransomware remains a significant discussion in boardrooms around the world. As we enter 2023, it’s increasingly obvious that people’s daily lives continue to become ever more inextricably intertwined with technology, increasing the potential reward for thieves participating in ransomware attacks.
Watch Now

Spotlight

Phishing-Angriffe haben sich bereits seit einigen Jahren als häufigster Angriffsvektor etabliert. Begünstigt durch Faktoren wie die COVID-19-Pandemie, die Umstellung auf dezentrale Arbeitskonzepte und die kritische Log4j-Sicherheitslücke war 2021 eine weitere Zunahme um 29 % gegenüber dem Vorjahr zu verzeichnen. Phishing-Bedrohu

resources